A STUDY ON INTRUSION DETECTION

Abstract

Intrusion Detection System (IDS) is meant to be a software application which monitors the network or system activities and finds if any malicious operations take place. Tremendous growth and practice of internet raises concerns about how to protect and communicate the digital data in a safe manner. Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion detection techniques, methods and algorithms assist to identify these attacks. This main objective of this paper is to provide a complete study about the description of intrusion detection, history, life cycle, types of intrusion detection methods, types of attacks, different tools and techniques, research needs, tasks and applications

Authors and Affiliations

SYEDA GAUHAR FATIMA, SYEDA KAUSAR FATIMA, SYED ABDUL SATTAR and SYED ADIL

Keywords

Related Articles

A SURVEY ON IOT TECHNOLOGY

Internet of Things (IOT) has provided an opportunity to construct powerful industrial system and applications by leveraging the increasing ubiquity of RFID, wireless, mobile and sensor devices. Various industrial IOT a...

A MONITORING SCHEME WITH IOT AND SENSOR EXPERTISE

Air quality has been largely affected by industrial activities, which have caused many health issues among people. Air pollutants levels can be measured using gas sensors. Internet of Things (IoT) technology can be use...

CONSTRUCTING AN INNOVATION ADOPTION CONCEPTUAL LENS/PRELIMINARY FRAME WORK FOR FURTHER TESTING IN UPSTREAM OIL AND GAS

Conceptual Lens helps to focus our study along certain directions for answering the research questions. A Conceptual Lens made from the existing literature helps the researcher to frame relevant questions to be asked t...

FUZZY IDEALS AND FUZZY DOT IDEALS ON BH-ALGEBRAS

In this paper we introduce the notions of Fuzzy Ideals in BH-algebras and the notion of fuzzy dot Ideals of BH-algebras and investigate some of their results

ADVANCEMENT IN ULTRASONIC VIBRATION AND MAGNETIC FIELD ASSISTED MICRO-EDM PROCESS: AN OVERVIEW

Micro-machining of components has been emerged as a peak demand in the world of micro-manufacturing. Micro-EDM is proved to be the most suitable for micro drilling purposes. It is very essential to fabricate micro hole...

Download PDF file
  • EP ID EP46278
  • DOI 10.34218/IJARET.10.2.2019.016
  • Views 232
  • Downloads 0

How To Cite

SYEDA GAUHAR FATIMA, SYEDA KAUSAR FATIMA, SYED ABDUL SATTAR and SYED ADIL (2019). A STUDY ON INTRUSION DETECTION. International Journal of Advanced Research in Engineering and Technology, 10(2), -. https://europub.co.uk./articles/-A-46278